Governmental establishments are maintaining historical data for job applicants for future analysis of predication, improvement of benefits, profits, and development of organizations and institutions. In e-government, a decision can be made about job seekers after mining in their information that will lead to a beneficial insight. This paper proposes the development and implementation of an applicant's appropriate job prediction system to suit his or her skills using web content classification algorithms (Logit Boost, j48, PART, Hoeffding Tree, Naive Bayes). Furthermore, the results of the classification algorithms are compared based on data sets called "job classification data" sets. Experimental results indicated that the algorithm j48 had the highest precision (94.80%) compared to other algorithms for the aforementioned dataset.
Abstract
Theoretically, the aim of the paper is identify linguistic expressions, such as proverbs, wise sayings, and popular sayings, used by the playwright A. N. Ostrovsky , along with their translations into Arabic by the Iraqi translator Abdullah Habbah and the Syrian translator HashimHumadi. And practically, there were found about fifty sayings, made of proverbs, wise sayings and popular sayings, which were identified and taken into analysis in respect to their Arabic translation , with the specification of the best rendition of the original text.
Critics and professionals em
... Show MoreThe current research aims to shed light on the Global Reporting Initiative (GRI), which helps to report financial and non-financial information by economic units in general and listed on the Iraq Stock Exchange in particular. The research was based on a main premise that apply the criteria of the Global Reporting Initiative (GRI) would provide useful information to users to help them make appropriate decisions. To achieve the goal of the research, the descriptive analysis method was used, and quantitative analysis was used. At the level of the descriptive analysis method, a desk survey was conducted. As for the quantitative analysis, it relied on applied data through a questionnaire form (Questioners) as a research tool, and the
... Show MoreThis deals with estimation of Reliability function and one shape parameter (?) of two- parameters Burr – XII , when ?(shape parameter is known) (?=0.5,1,1.5) and also the initial values of (?=1), while different sample shze n= 10, 20, 30, 50) bare used. The results depend on empirical study through simulation experiments are applied to compare the four methods of estimation, as well as computing the reliability function . The results of Mean square error indicates that Jacknif estimator is better than other three estimators , for all sample size and parameter values
Trichomonas vaginalis is an eukaryotic parasite that causes the most common non-viral sexually transmitted infection, trichomoniasis. This disease is responsible for many serious health problems such as preterm birth. More than half of the infected women do not develop symptoms, which makes it difficult to diagnose the
disease. In this study, a specific indirect ELISA method was developed to detect anti-Trichomonas vaginalis IgM and IgG immunoglobulins in the sera of infected females. The aim of this study was to investigate the sensitivity of a simple ELISA procedure in comparison to the classical urine examination and vaginal wet mount preparation for the diagnosis of T. vaginalis. The sensitivity of the indirect ELISA was compared
In light of crises, the need for efficient and flexible public administrations to make quick and decisive decisions, also institutions capable of directing the internal elements and components of them and adapting them to the requirements of rapid change due to crises and disasters, which led to scarce resources becoming scarcer and economic, political and social problems becomes more prominent. For the majority of developing countries, including Iraq, the increasing need for the importance of moving towards enhancing the efficiency of the performance of public institutions while trying to predict their future, can only be achieved. Through solid mechanisms and principles of governance that enhance the ability of institutions and make them
... Show MoreThe objective of the conventional well testing technique is to evaluate well- reservoir interaction through determining the flow capacity and well potential on a short-term basis by relying on the transient pressure response methodology. The well testing analysis is a major input to the reservoir simulation model to validate the near wellbore characteristics and update the variables that are normally function of time such as skin, permeability and productivity multipliers.
Well test analysis models are normally built on analytical approaches with fundamental physical of homogenous media with line source solution. Many developments in the last decade were made to increase the resolution of transient response derivation to meet the
... Show MoreHerbal remedies are used in induction of lactation. In view of that .Borage Officinalis was employed to ensure an abundant milk supply or rectify milk insufficiency .However, this remedy has not been scientifically tested .The animals were treated with the aqueous extract of Borage Officinalis flowers at a daily concentration of 100 mg / kg body weight /ml for each rat through Oro-gastric tube for 14 days. Animals were subdivided into subgroups according to their physiological status. Mammary glands of these animals were processed for histological, histochemical and immunohistochemical studies. Parameters indicated that the aqueous extract of Borage Officinalis flowers induced lactogenesis in the mammmary glands of virgin and pregnant rats
... Show MoreThe modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show More